Exposing Event Log Tampering with Uncoder AI’s AI Decision Tree for Splunk Queries

Exposing Event Log Tampering with Uncoder AI’s AI Decision Tree for Splunk Queries

Steven Edwards
Steven Edwards Technical Writer linkedin icon Follow

Add to my AI research

One of the more advanced tactics in attacker playbooks is tampering with event log configurations to erase traces of compromise. Detecting such attempts via Windows Registry modifications is complex—often involving detailed Splunk queries that filter by registry keys and permissions.

To quickly make sense of these queries, analysts are turning to Uncoder AI’s AI-generated Decision Tree feature. It doesn’t just summarize queries—it visually maps them into logical branches, helping security teams understand intent, scope, and execution paths in seconds.

Explore Uncoder AI

Exposing Event Log Tampering with Uncoder AI’s AI Decision Tree for Splunk Queries

Uncoder AI Visualizes Splunk Query (SPL) Logic for Log Tampering Detection

Use Case: Detecting Registry-Based Event Log Manipulation

In this example, a Splunk SPL query tracks changes to registry paths related to:

  • SYSTEM\CurrentControlSet\Services\EventLog

  • Policies\Microsoft\Windows\EventLog

  • Microsoft\Windows\CurrentVersion\WINEVT\Channels

These keys are often targeted to disable or reroute log retention, particularly via permission edits to CustomSD or ChannelAccess.

The rule also checks for Security Descriptor Definition Language (SDDL) patterns in the Details field—like D:(…—which signify direct permission modifications, a red flag in log tampering scenarios.

Join SOC Prime's Detection as Code platform to improve visibility into threats most relevant to your business. To help you get started and drive immediate value, book a meeting now with SOC Prime experts.

More SOC Prime Platform Articles